PRINCIPLES OF INFORMATION TECHNOLOGY -Supercomputers

Info-224 5/1/2012 SUPERCOMPUTERS Supercomputers work on the principle of doing large amounts of work in minimum time. Supercomputers are capable of performing operations in minutes and seconds, that would take a team of even high-end machines, days or weeks or more realistically, months to perform. They are also super in terms of maintenance and need large rooms all to themselves, along with extremely cool temperature surroundings. They consume a lot of power and have a very high processing speed, due to their large number of microprocessors. Supercomputers are used in situations, where a large amount of data needs to be processed in a small time span, with rendering and modeling operations performed simultaneously[1]. The primary use for supercomputers is in scientific computing, which requires high-powered computers to perform calculations. Scientific organizations like NASA boast supercomputers the size of rooms for the purpose of performing calculations, rendering complex formulas, and performing other tasks which require a formidable amount of computer power[2]. What are Supercomputers Used for? Biology Supercomputers can be used to model or render the working of the nervous system or brain of an organism. Scientist use them for molecular modeling, which gives them the opportunity to compute the structures and properties of biological compounds. Supercomputers

  • Word count: 869
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Facebook and its Multimedia elements

Olympia College Assignment Diploma In Information Technology ________________ Tables of Contents Contents Page . Question 2. Introduction 3. Main Body 4. Conclusion ________________ QUESTION . Facebook is known as the fastest growing social network in today’s world, with all the multimedia elements such as text, audio, video, graphic and animations instilled in it. Based on this statement, do a research on how all these elements are used accordingly in the website. INTRODUCTION SOCIAL NETWORK Social network site is a very common thing all around the world in this era. Social network site is also known as SNS.There are many types of social network these days the examples are Friendster ,MySpace, Facebook, Tagged, Twitter and many more. Statistic shows that the most common used social network in the year of 2010 is Facebook with 133,623,529 visits and followed by MySpace with 50,615,444 visits and Twitter comes along with 23,573,178 visits and many more. Social networking site allows people all around world to keep in touch with old friends and get new friends at the same time. Social networking sites has also been used by those who works, they convey their particular information to everyone to maximise their publicity. These sites can

  • Word count: 2244
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

IT Project - Over the last month we have researched and planned how Bear Bar can make the jump into the information age

IT 205 Final Project Paper Over the last month we have researched and planned how Bear Bar can make the jump into the information age. We will now begin implementing our plan to get Bead Bar started on their journey into the information age. We have already gone through the planning phase in which we met with all the managers and key players to determine what the need of the system would be. Once we talked to each manager, we went through the system analysis phase to determine what hardware, software, databases and training would work best for our system. We will now begin the next steps of the process in which we will design our system, develop, test, and then roll it out to the entire company. Remember, we have decided to make this jump into the information age so that Bead Bar can grow its existing business and be more competitive in a growing market. In the systems analysis phase, we decided on purchasing 14 personal computer systems that would run and operate using Microsoft XP Windows Operating System. Each of these computers will be equipped with a standard keyboard, mouse and a LCD monitor. Each computer will need to have a processor at 2.8 MHz, 512 MB of memory, a CD Drive, and an 80 gigabyte hard drive. We will install one computer system at each of the company owned studios, one for each senior manager and will have one extra as a backup. We also decided to

  • Word count: 1436
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Internet Privacy and Security

Internet Safety and Security Internet Safety and Security Internet Safety and Security Internet Safety and Security As the internet continues to grow, we may never be able to completely protect our privacy especially when it comes to shopping online and social networking sites. A THESIS ________________ ________________ Abstract I chose this topic because it seems to always be in the news and there is also an interesting section about this topic in chapter three in the text. Whether it has to do with online shopping or social networking sites, it seems like once we make it on the internet, anyone can be located and can be at risk. Just Google anyone’s name and you may be surprised about what comes up. If you Google my name, you may find that in 2003, I won a year’s supply of dog food! A friend found it and I had no idea that it was posted online. There are so many ways that we lose our privacy on line and the ways we need to protect ourselves and our personal information. There are so many avenues where our names can end up on line and everyone needs to use caution when sharing any personal information on line. Even though I do not think we can be completely successful with securing our privacy on line, there are preventative measures that can be taken. ________________ ________________ Contents Abstract Chapter I Safey and

  • Word count: 3127
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Programming Concepts. Andora Video is a small shop selling videos. The owner, Raul, wishes to develop a sales transaction processing system. The main objective of this system should be to display the total price of the sale after discounts, tax e.t.c.

PROGRAMMING CONCEPTS Table of Contents INTRODUCTION 3 SCENARIO 3 USER REQUIREMENTS 3 INFORMATION 3 GUI (GRAPHIC USER INTERFACE) 4 VERSION 1 5 REQUIREMENTS 5 DATA TABLE 5 DESIGN PSEUDOCODE 6 IMPLEMENTATION (v. 1) 6 TESTING 8 Syntax Errors 8 Logical Errors 8 VERSION 2 10 REQUIREMENTS 10 DATA TABLE 10 DESIGN PSEUDOCODE 11 IMPLEMENTATION (v. 2) 11 TESTING 13 Syntax Errors 13 Logical Errors - Order 1 15 Logical Errors - Order 2 (first attempt) 15 Logical Errors - Order 2 (second attempt) 16 VERSION 3 17 REQUIREMENTS 17 DATA TABLE 17 DESIGN PSEUDOCODE 18 FINAL IMPLEMENTATION (v. 3) 18 TESTING 21 Database connectivity 21 EVALUATION 22 CONCLUSION 22 BIBLIOGRAPHY 23 BOOKS 23 WEBSITES 23 SOFTWARE 23 INTRODUCTION SCENARIO Andora Video is a small shop selling videos. The owner, Raul, wishes to develop a sales transaction processing system. The main objective of this system should be to display the total price of the sale after discounts, tax e.t.c. This should occur as a result of the input of data surrounding the video and its purchase. USER REQUIREMENTS * An application that is able to process multiple video titles * Calculates discounts, VAT and totals * Determine different discounts based upon the quantity * Display calculations in relevant format * Store inputted and calculated data into a electronic record * Capable of supporting

  • Word count: 3756
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the sequence of stages, in that often the system cannot be tested or run until it is fully complete.

SYSTEMS ANALYSIS . Traditional Systems Life Cycle 4 .1 Introduction 4 .2 Shortcomings 5 .3 Stages 5 .3.1 Initiation 5 .3.2 Feasibility 5 .3.3 Investigation and Analysis 5 .3.4 Design 5 .3.5 Implementation 6 .3.6 Testing 6 .3.7 Maintenance 6 2. SSADM 6 2.1 Introduction 6 2.2 Advantages / Disadvantages 6 2.3 Suitability 7 2.4 Stages 7 2.4.1 The Feasibility Study 7 2.4.2 Investigation of Current System 8 2.4.3 Business Systems Options (BSOs) 8 2.4.4 Requirements Specification 8 2.4.5 Technical System Options (TSOs) 8 2.4.6 Logical Design 8 2.4.7 Physical Design 8 2.5 Tools and Techniques 8 2.5.1 Data Flow Diagrams (DFD) 8 2.5.2 Entity Relation Diagrams 10 3. DSDM 10 3.1 Introduction 10 3.2 Advantages / Disadvantages 10 3.3 Suitability 10 3.4 Stages 10 3.4.1 Functional Model Iteration 11 3.4.2 Design and Build Iteration 11 3.4.3 Implementation 11 3.5 Tools and Techniques 11 3.5.1 CASE Tools 11 3.5.2 Facilitated Workshops 11 4. Fact-finding 11 4.1 Document analysis 11 4.2 Observation 12 4.3 Questionnaire 12 4.4 Interviews 12 4.5 Data Recording Techniques 12 5. Existing System 12 5.1 Interview Transcript - Restaurant Manager 12 5.2 DFDs 13 5.2.1 Context Diagram 13 5.2.2 Level 1 Diagram 15 5.3 ERD 16 6. Design Specification 16 6.1 The problems associated with the current system 16 6.2 New system requirements 16 6.3 Business

  • Word count: 6224
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk. Finally, prepare a report recommending to your instruc

CSC208 INFORMATION TECHNOLOGY FOR BUSINESS (1K1) SESSION JAN 2012 Name : Yen Zhuo Sheng I/D No : I11008652 Lecturer : Chong Fong Kim Programme : BMAUH Due Date : 26-02-2012 Assessment Criteria Total Marks Given Marks . Introduction 0 2. Relevant literature review/background study 20 3. Discussion of the requirements 30 4. Conclusion 0 5. Proper referencing (Citation and references) 20 6. Report Format (i.e. indentation, readiness, Table of Contents, page numbering, header, appendix) 0 00 Late Submission Penalty Extra credit (CD) 0 Total Final Mark (10%) Lecturer's Comments Penalty for late submission: day - minus 20% of total mark awarded 2 days - minus 50% of total mark awarded 3 days - 0 mark for this piece of coursework TABLE OF CONTENTS No. Topic Page Number Topic Description 4 2 Introduction 5 3 Contents 3.1 Ways to destroy the data before discarding the computer 6 - 7 3.2 Programs that can permanently destroy data on a hard disk 8 - 13 4 Conclusion 4 5 Recommendation 5 6 References 6 . TASK GIVEN Topic #5 Most companies and government agencies make extensive efforts to protect the data and information stored on their computers. When a computer reaches the end of its useful life, it either is recycled or thrown away. Although the obsolete computer does not perform well, if at all, the data on hard

  • Word count: 2748
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Computer Networks Architectures & Protocols

Computer Networks Architectures & Protocols Part One (Computer Networks Layering Models) i. The communication between the nodes in a data network must be correctly defined to ensure correct interpretation of the packets by the receiving intermediate and the end systems. The packets exchanged between the nodes are defined by a protocol or a communications language. There are many functions which may be needed to be performed by a protocol. These range from the specification of connectors, addresses of the communications nodes, identification of interfaces, options, flow control, reliability, error reporting, synchronization, etc. In practice there are so many different functions, that a set (also known as suite or stack) of protocols are usually defined. Each protocol in the suite handles one specific aspect of the communication Advantages of layered protocol The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Also the layered protocol diminishes the complexity of networking by separating it into many functions or layers and the introduction of new features in the layer can be accomplished without

  • Word count: 3245
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Comparison between documents collected from three different organisations.

Introduction I have collected six documents from three different organisations, two from each. I collected them contacting these different organisations and asking for the various documents ie. an application form and an invoice. The three organisations I used were, 'The State University Of New Jersey', 'Business serve' and 'Wyeth'. For the purpose of this document they will be lettered 'A' 'B' and 'C' in the order previously mentioned. Organisation 'A' is a university in America; I collected the documents by emailing them. Organisation 'B' is a business dealing in electrics, I visited them in order to collect the documents. Organisation 'C' is a pharmacist. Looking at these documents I have determined many differences and similarities. Application forms I have carefully analysed the three application forms. The main purpose of an application form is to retrieve information from potential employees. By having your own application form one can specify the questions to match the criteria needed, however not all application forms are to recruit new staff. The purpose of 'A' is an application form for entering a university. Both 'B' and 'C' are recruiting staff. Although the basic formats of all three forms are similar in the way there are questions presented to the reader, the reader then answers the questions in the space provided. The layout and context are very different

  • Word count: 1181
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

The Challenges of Network Security

The Challenges of Network Security Remediation at a Regional University A thesis presented to the faculty of the Department of Computer and Information Sciences East Tennessee State University In partial fulfillment of the requirements for the degree Master of Science in Computer Science by William R. Simons May 2005 Dr. Qing Yuan, Chair Dr. Phillip Pfeiffer Mr. Steven Jenkins Keywords: computer, system security, network security, security audit, security hardening, vulnerability, remediation, Nessus, Nmap 2 ABSTRACT The Challenges of Network Security Remediation at a Regional University by William R. Simons This thesis describes challenges encountered during a year-long effort to improve the security of the 3,300 node administrative computer network at East Tennessee State University. The key remediation strategies used included employing the vulnerability scanner Nessus to profile the network, analyzing the scan results, and attempting to remove the most critical vulnerabilities found. The project succeeded in decreasing known "high" criticality vulnerabilities on campus by 26.1%, and confirmed four standard observations about the challenges of network administration: Vulnerability scanning is a lengthy task best performed in parallel and supported by automated data analysis. Securing a network is like trying to hit a moving target, due to an

  • Word count: 25338
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay